Privacy Impact Assessment: (Insert Project Name) : Date
Privacy Impact Assessment: (Insert Project Name) : Date
Assessment:
[Insert Project Name]
Date:
Document Control
Date Author Version Change Reference
/conversion/tmp/activity_task_scratch/568750998.docx Page 1 of 18
Department
PIA 2019-XX-xx DATE, 2019
Reviews
Date File Name / Version # Reviewed by
Note: It is recommended you send your PIA to the department’s Privacy Officer for review.
1.1 Policies, Forms and Reports (PIA Manual reference: 5.1 Collecting information and supporting
documentation)
Prior to conducting a PIA, identifying other individuals who have knowledge of the initiative, the business
area and processes is critical. A PIA also requires the expertise of others such as information technology
and security analysts, and your ATIPP staff to ensure that the assessment is accurate and comprehensive.
Completing a PIA requires a lot of information, so before you begin writing be sure to gather as much
information and supporting documentation as possible such as:
Project charters;
Business requirements;
Forms used by the program to collect PI;
Other applicable legislation (beyond ATIPP and HIPMA) that may be relevant;
Operational procedures and business process documentation;
User, administrative and/or technical manuals from vendors;
Agreements – e.g. Services, System Access, Information Sharing, Acceptable Use;
System documentation such as network and system architecture diagrams, data models, technical
and security requirements, and system configuration;
Policies and Procedures; and
Previously conducted related PIAs.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 2 of 18
Department
PIA 2019-XX-xx DATE, 2019
1 GENERAL
Department/Corporation:
PIA Drafter:
Program Manager:
In the following questions, delete the descriptive text and replace it with your own.
1.1 Project Overview (PIA manual reference: 5.2 Documenting the project)
1.1.1 Description of the Project (PIA manual reference: 5.2.1 Description of the project)
This section of the PIA should provide a general description of the project and the context in which it functions.
Depending on the complexity of the initiative, this may be quite lengthy and may include a Background, Current
State and Future State description. For smaller initiatives, a few paragraphs may suffice. Whatever the case, you
want to make the reader understand why the initiative is being done.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 3 of 18
Department
PIA 2019-XX-xx DATE, 2019
1.1.4 Objectives and Benefits (PIA manual reference: 5.2.4 Objective and benefits)
State the project’s objective succinctly, as well as the anticipated benefits to the organization (i.e. time and costs
efficiencies, etc.). Again, for larger projects this information is often available in existing Project Charters,
Briefing Notes and other project documents.
1.1.5 Description of Personal Information Collected (PIA manual reference: 5.3.1 Types of data
(field level or clusters))
In the excel file below, complete Tab 2: Categories of PI.
Personal
Information Map.xls
2.1 Personal Information Flow Diagram and Table (PIA manual reference: 5.3.3 Data
flow mapping)
Please provide a flow diagram that shows how your initiative will collect, use, and/or disclose personal
information and complete the table below. For an example of a completed data flow, see section 5.3.3 in
the PIA Manual.
NOTE: You need only cite the categories of PI identified when you completed the excel file in question 1.1.6
2 PI is used by X
3 PI is used by X
4 PI is disclosed by X to X
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 4 of 18
Department
PIA 2019-XX-xx DATE, 2019
3 PRIVACY ANALYSIS
The following analysis informs the risk summary and mitigation plan of the PIA.
Risks identified in the following sections (3.1-3.10) feed directly into the Risk and
Mitigation table in section 4.1.
Relevant sections of legislation and policy: HIPMA General Regulations s. 16; GAM 2.27 paragraph 3(2)
(e) and 3(2)(f).
Name Position
Name Position
Risk Description
1-1 Describe Privacy Risk / Threat here
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 5 of 18
Department
PIA 2019-XX-xx DATE, 2019
Relevant sections of legislation and policy: HIPMA Subsection 39(a): the purpose of the collection, use or
disclosure of the personal health Information; and subsection 30(2) of the ATIPP Act.
3.2.1 Describe how your project has notified the individual the purpose for which the personal
information is being collected? Include sample collection notice.
For example: intake forms, posters, verbally, etc. …
Please include your proposed or existing wording for a collection notice and where it will be located for
individuals to read before collection takes place. You can also attach a screen shot or a copy of your form
where the collection notice would be located.
Risk Description
2-1 Describe Privacy Risk / Threat here
Relevant sections of legislation and policy: HIPMA Section 39: Knowledgeable consent; HIPMA Section
41: Notice and Knowledgeable Consent; ATIPP Subsection 35(1)(b): Use of Personal Information; ATIPP
Subsection 36(b): Disclosure of Personal Information.
Note: Consent is not an authority to collect personal information under ATIPP – it can only be used if
your program is governed by HIPMA.
3.3.1 Is consent being utilized as an authority to collect, use and/or disclose personal
information?
At minimum, address the following in your response:
Whether consent is being collected for the collection, use or disclosure;
Demonstrate how the consent meets applicable legal requirements;
A sample of the consent statement that will be utilized;
Whether the individual can withdraw their consent;
Whether standards/procedures are in place to ensure the individual is authorized or has the
capacity to give consent; and
The manner by which consent will be obtained: implied consent, express consent…
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 6 of 18
Department
PIA 2019-XX-xx DATE, 2019
Risk Description
3-1 Describe Privacy Risk / Threat here
Relevant sections of legislation and policy: HIPMA Section 53: Where collection is permitted; HIPMA
Section 54: Where Indirect Collection is permitted; HIPMA: Collection of Personal Health Information
Policy; ATIPP Section 29: Purpose for which Personal Information may be collected; ATIPP Section 30:
How Personal Information is to be Collected; ATIPP: Collection of Personal Information Policy.
3.4.3 Has the program conducted a review of the personal information collected to ensure only
the minimum necessary is being collected?
At minimum, address the following in your response:
The individual who conducted the review as well as the date of the review occurred.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 7 of 18
Department
PIA 2019-XX-xx DATE, 2019
Risk Description
4-1 Describe Privacy Risk / Threat here
3.5 Use, Disclosure and Retention of Personal Information (PIA manual reference:
5.5.5 Limiting use, disclosure, and retention)
Objectives:
(1) To ensure personal information is used and disclosed for purposes it was collected, except with the
consent of the individual or if authorized by law.
(2) To ensure personal information is retained only as long as necessary for the fulfillment of the stated
purposes and is destroyed as authorized by law. For more information, see section 5.5.5 of the PIA
Manual.
Relevant sections of legislation and policy: HIPMA Section 55: Use with Consent; HIPMA Section 56: Use
not Requiring Consent; HIPMA Section 57: Disclosure with Consent; HIPMA Section 58; Disclosure not
Requiring Consent; HIPMA Policies: Use and Disclosure of Personal Health Information; ATIPP Section
35: Use of Personal Information; ATIPP Sections 36 – 39: Disclosure of Personal Information; ATIPP
Policies: Use and Disclosure of Personal Information; Archives Act Records Management Regulations
Section 5.
3.5.1 Does your project use personal information to make decisions that directly affect(s) an
individual(s)?
For example: A determination about whether an individual is entitled to income assistance, a decision on
hiring an individual, or a determination about eligibility for subsidized housing.
3.5.2 What secondary uses or disclosures are contemplated for the personal information
collected?
At minimum, address the following in your response:
What the information will be used or disclosed for;
What organization will the information be used by or disclosed to;
Whether consideration has been given to de-identifying the information;
Whether data-linking will occur;
Whether unique identifiers will be used or assigned;
Whether a formal agreement has been entered into.
o Does the agreement adhere to policy requirements? For example, as defined in the
“Agreements” section in the Disclosure Personal Information Policy for ATIPP.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 8 of 18
Department
PIA 2019-XX-xx DATE, 2019
3.5.3 Describe how personal information is used for evaluation or planning purposes.
3.5.4 Does the project disclose personal information for research or statistical purposes? If yes,
please explain and attach the research agreement.
For example: you will be disclosing information to PhD students so they can conduct research.
3.5.6 Identify Privacy Risks/Security Threats regarding Use, Disclosure, Retention Disclosure
Risk Description
5-1 Describe Privacy Risk / Threat here
Relevant sections of legislation and policy: HIPMA Section 52: Accuracy of Information Collected;
HIPMA Section 28: Correction of Personal Information; ATIPP Section 31: Accuracy of Personal
Information; ATIPP Section 32: Right to Request Correction of Personal Information.
3.6.1 Describe the steps taken to ensure that the personal information is accurate, complete and
up-to-date.
For example: records indicate the date the information was last updated; the information systems logs
corrections or modifications to information
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 9 of 18
Department
PIA 2019-XX-xx DATE, 2019
Risk Description
6-1 Describe Privacy Risk / Threat here
Relevant sections of legislation and policy: HIPMA Section 19: Custodian’s Information Practices
Generally and HIPMA General Regulation Section 14: Custodian’s Information Practices; ATIPP Section
33: Protection of Personal Information
3.7.2 Describe how users are authenticated before accessing the information.
Objective: To corroborate that a person is the one claimed.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 10 of 18
Department
PIA 2019-XX-xx DATE, 2019
Are access privileges limited to the least amount of personal information required to carry out
job-related functions?
What method(s) is/are used?
o User-based access: An individual has access to data based on who he or she is.
o Role-based access: An individual has access to data based on his or her role within the
organisation.
o Context-based access: An individual has access to data based on where and when he or
she is accessing the data. Context-based access also incorporates user-based and/or
role-based access to authenticate the user.
Is there an access control policy?
o Does the access control policy clearly state the information access privileges for each
defined role in the information system?
o Does the access control policy clearly state the information access privileges for each
defined role in the information system?
o Is a formal user registration process in place?
Does the user registration process include: verification of access levels,
maintenance of records of access privileges, audit processes, and actions to
ensure access is not granted until formally approved?
Is a current, accurate inventory of computer accounts maintained and is it
reviewed on a regular basis to identify dormant, fictitious or unused accounts?
o Is there a formal process to assign defined roles to users?
o Is a monitoring process in place to oversee, manage and review user access rights and
roles at regular intervals?
Are users given a written statement of their access rights and required to sign that they
understand the conditions of access?
3.7.4 Describe how you will audit or track who accessed information.
Objective: To have a record showing who has had access to the information system and what operations
were performed during a period of time.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 11 of 18
Department
PIA 2019-XX-xx DATE, 2019
3.7.7 Describe the physical security measures taken to protect the personal information.
Objective: To protect the actual computer hardware, software, data and information from physical damage
or loss due to natural, human, or environmental threats.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 12 of 18
Department
PIA 2019-XX-xx DATE, 2019
3.7.8 Describe the technical security measures taken to protect the personal information.
Objective: To secure the information system and the networks on which the data and information reside.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 13 of 18
Department
PIA 2019-XX-xx DATE, 2019
3.7.9 Describe the administrative security measures taken to protect the personal information.
Objective: To control human behaviour through clearly written policies and procedures.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 14 of 18
Department
PIA 2019-XX-xx DATE, 2019
Risk Description
7-1 Describe Privacy Risk / Threat here
Relevant sections of legislation and policy: HIPMA Section 21: Statement of information practices to be
made public; GAM 2.27subsection 2(2)(g).
3.8.1 Describe how policies and procedures related to the management of personal information
are made available to the public.
Risk Description
8-1 Describe Privacy Risk / Threat here
3.9 Individual Access to Personal Information (PIA manual reference: 5.5.9 Individual
access)
Objective: To ensure compliance with privacy legislation by giving individual timely access personal
information held by public bodies or custodians.
Relevant sections of legislation and policy: HIPMA Section 24: Right to Access, Section 25: Application
for Access, Section 26: Custodian’s Response to access request; ATIPP sections 1(1)(b), 5 and 6.
3.9.2 Has a Personal Information Map been completed for this project?
Note: Complete Tab 3: PI Map (Inventory) from the excel file you completed when answering question
1.1.6.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 15 of 18
Department
PIA 2019-XX-xx DATE, 2019
Risk Description
9-1 Describe Privacy Risk / Threat here
Relevant sections of legislation and policy: HIPMA Paragraph 19(3)(g): establish a procedure for
receiving and responding to complaints regarding its information practices; GAM 2.27: Privacy
Complaints Policy
3.10.1 Are policies and procedures related to the management of personal information available to
the public?
3.10.2 Are staff aware and procedures in place to respond to a privacy complaint?
Risk Description
1 Describe Privacy Risk / Threat here
4.1 Risk Mitigation Table (PIA manual reference: 6.0 Assessing risk and mitigation
strategies)
Please complete the table below. Input all of the risks identified in sections 3.1 to 3.10, identifying any privacy
risks associated with the collection, use or disclosure of the personal information involved in this project and
stating the mitigation strategies that will be implemented.
For more information, see section 3 in the PIA Manual.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 16 of 18
Department
PIA 2019-XX-xx DATE, 2019
# Privacy Risk / Threat Likel Impa Risk Mitigation Strategy Account- Risk
ihoo ct Level ability Level
d After
Mitigati
on
1 Records of PHI are stored L M L Move the records of Records VL
in a shoebox under the PHI to a filing cabinet Management
desk, creating a risk that that is securely locked Unit
PHI can be accessed by when not in use.
unauthorized individuals.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 17 of 18
Department
PIA 2019-XX-xx DATE, 2019
ATIPP Office
Reviewer ___________________________________________ ___________________
Name, Position Date
To complete the process, a final copy of this PIA (with all applicable signatures and attachments)
must be provided to ATIPP office for its records.
/conversion/tmp/activity_task_scratch/568750998.docx
Insert Hyperlink
Page 18 of 18